DOI QR코드

DOI QR Code

Genetic Symmetric Key Generation for IDEA

  • Malhotra, Nandini (Department of Computer Science and Engineering, National Institute of Technology) ;
  • Nagpal, Geeta (Department of Computer Science and Engineering, National Institute of Technology)
  • Received : 2013.06.19
  • Accepted : 2013.09.20
  • Published : 2015.06.30

Abstract

Cryptography aims at transmitting secure data over an unsecure network in coded version so that only the intended recipient can analyze it. Communication through messages, emails, or various other modes requires high security so as to maintain the confidentiality of the content. This paper deals with IDEA's shortcoming of generating weak keys. If these keys are used for encryption and decryption may result in the easy prediction of ciphertext corresponding to the plaintext. For applying genetic approach, which is well-known optimization technique, to the weak keys, we obtained a definite solution to convert the weaker keys to stronger ones. The chances of generating a weak key in IDEA are very rare, but if it is produced, it could lead to a huge risk of attacks being made on the key, as well as on the information. Hence, measures have been taken to safeguard the key and to ensure the privacy of information.

Keywords

References

  1. B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd ed. New York, NY: John Wiley & Sons, 1996.
  2. D. E. Goldberg, Genetic Algorithms, in Search, Optimization & Machine Learning. Reading, MA: Addison-Wesley, 2009.
  3. R. Ghosh, "A modified improved text encryption approach inspired by genetic algorithm techniques using RSA algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 6, pp. 263-268, Jun. 2012.
  4. J. Daemen, R. Govaerts, and J. Vandewalle, "Weak keys for IDEA," in Proceedings of the 13th Annual International Cryptology Conference (CRYPTO'93), Santa Barbara, CA, 1994, pp. 224-230.
  5. P. Hawkes, "Differential-linear weak key classes of IDEA," in Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'98), Espoo, Finland, 1998, pp. 112-126.
  6. A. Biryukov, J. Nakahara Jr, B. Preneel, and J. Vandewalle, "New weak-key classes of IDEA," in Proceedings of the 4th International Conference on Information and Communications Security (ICICS2002), Singapore, 2002, pp. 315-326.
  7. D. H. Zhu, "An attack on 5.5-round IDEA," in Proceedings of the 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS2010), Xiamen, China, 2010, pp 18-21.
  8. I. A. Abed, "Finding the best key stream by using genetic algorithm for image encryption," Journal of Basrah Researches (Sciences), vol. 36, no. 3, pp. 72-80, Jun. 2010.
  9. S. Bhowmik and S. Acharyya, "Image cryptography: the genetic algorithm approach," in Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE2011), Shanghai, China, 2011, pp. 223-227.
  10. S. Goyat, "Genetic key generation for public key cryptography," International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 3, Jul. 2012.